Jump to content

Search the Community

Showing results for tags 'kali linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 10 results

  1. Hey guys I am pretty new here in this forums guys my problem is that I using aircrack-ng method to get handhake but I am not getting it . I am doing everything correct with no error but time goes by . not getting any handshakes and I am sending infinty deauth packets to the victims but then also i did not get handshake and a client is there and by the way if I try the attack on my own network I get the handshakes in minutes. Please help me
  2. Can someone please tell me how to disable my eth0 interface on boot. I am using the latest version of Kali Linux 2020-02-17. I can sudo ifconfig eth0 down and this works no problem. Except i dont want to do this every time and would just like it to be disabled at boot until i need it. Normally i would add it to the /etc/rc.local file but that does not exist any more.
  3. Hello, I've been attempting to redirect port 80 to port 8080 using iptables v1.8.3 to test an SSL strip MITM attack. I've entered the command: iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 80 -j REDIRECT --to-port 8080 upon entering it gives me the _error_: unknown option "--dport" it also doesn't recognize the "--to-port" option. I'm running Kali Linux on a Rasberry Pi 4B 4GB Does anyone know how I can resolve this? I haven't found anything useful on the web after three days of troubleshooting. cheers! -MichaelPV
  4. So I have been following this tutorial: https://m.wikihow.com/Hack-WPA/WPA2-Wi-Fi-with-Kali-Linux#step_2_17 And I haven't been able to get any WPA handshake. I use Kali Linux (latest 64-bit) on a live usb stick (8GB).
  5. Hello. I was trying to run iso kali linux in virtual box but it couldn't install right and my system was freezing during installation. So, i tried ova file of Kali that was fine to install and run at virtual box. Everyrhing was fine with that ova file of Kali Linux in virtual box until i tried to get Kali updated and upgrated. During this process the system was freezing so i closed the machine at virtual machine. When i tried to run again Kali it was like something changed.. no icons and it was asking me all the time to enter username and password. I deleted Kali Linux and tried to create a new project on vm but vm didnt recognize/appear that Kali Linux ova file anymore. Frist question.. is it possible to run Kali Linux iso file with VB or it must be the ova file which is for VB? Second question. After update and upgrade is it possible that it ruined my ova file and thats why vb can find it anymore and open it? Thanks.
  6. I just received my Pineapple Nano and i'm having a lot of trouble getting it to connecting through to the internet. I have been able to get everything setup but the internet. Ive used the .wp6 and what not. I'm on a 2012 Macbook pro running Linux in VirtualBox. Does anyone have any experience with getting it connect properly?
  7. Hi Been around the forum and can't find any answer. Trying to get the bash bunny online using the bb.sh sharing script. I managed to get access to the bunny thru SSH, but it seams like, that the wlan0 interface shuts down and the new USB Ethernet eth1 takes over. What do I miss here? My Process Guided setup ---------------------- Step 1 of 3: Select Default Gateway Default gateway reported as 192.168.1.1 Use the above reported default gateway? [Y/n]? y Step 2 of 3: Select Internet Interface Internet interface reported as wlan0 Use the above reported Internet interface? [Y/n]? y Step 3 of 3: Select Bash Bunny Interface Please connect the Bash Bunny to this computer. ................[Checking] Detected Bash Bunny on interface eth1 Use the above detected Bash Bunny interface? [Y/n]? y Settings saved. Saved Settings: Share Internet connection from wlan0 to Bash Bunny at eth1 through default gateway 192.168.1.1 SSH Connection ---------------------------- $ssh root@172.16.64.1 root@172.16.64.1's password: _____ _____ _____ _____ _____ _____ _____ _____ __ __ (\___/) | __ || _ || __|| | | | __ || | || | || | || | | (='.'=) | __ -|| ||__ || | | __ -|| | || | | || | | ||_ _| (")_(") |_____||__|__||_____||__|__| |_____||_____||_|___||_|___| |_| Bash Bunny by Hak5 USB Attack/Automation Platform Last login: Sat Aug 26 00:09:43 2017 from 172.16.64.10 root@bunny:~# apt-get update 0% [Connecting to httpredir.debian.org]^C root@bunny:~# iptables --------------- Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination ifconfig -------------- eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 172.16.64.10 netmask 255.255.255.0 broadcast 172.16.64.255 wlan0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.131 netmask 255.255.255.0 broadcast 192.168.1.255 Best Regards Claus
  8. I received a wifi pineapple nano as a Christmas gift and have yet to get any use out of it. I continually have issues restoring the firmware, IP address drops, can't access internet on host, etc. So... I finally got the firmware to load, 2.0.2, and can access the web panel on 172.16.42.1. However I cannot load modules or wifi bullets, nor access the internet from my computer. I did install wp6,sh appropriately. Here is my setup: Mac OS X running VMWare Fusion I have internet on my Mac, but not on Kali or pineapple. Kali Linux Guest on Bridge mode eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.163 netmask 255.255.255.0 broadcast 192.168.1.255 inet6 fe80::9214:9b83:34f6:e4fe prefixlen 64 scopeid 0x20<link> ether 00:50:56:2c:e8:c4 txqueuelen 1000 (Ethernet) RX packets 33831 bytes 38502566 (36.7 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 15159 bytes 1867459 (1.7 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 eth1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 172.16.42.111 netmask 255.255.255.0 broadcast 172.16.42.255 inet6 fe80::1ef:d781:91d2:dc5 prefixlen 64 scopeid 0x20<link> ether 00:c0:ca:90:dc:7f txqueuelen 1000 (Ethernet) RX packets 4972 bytes 3106425 (2.9 MiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 4745 bytes 871859 (851.4 KiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 USB tethered to nano Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 172.16.42.0 * 255.255.255.0 U 0 0 0 br-lan 192.168.1.0 * 255.255.255.0 U 0 0 0 wlan2 192.168.1.1 * 255.255.255.255 UH 0 0 0 wlan2 Any assistance would be greatly appreciated. I have searched forums but can't find an answer that solves my problem.
  9. What's up everybody, I'm having some issues. I just got a new wifi pineapple nano tactical and it's not being detected by Kali. It powers on, flickers a little before becoming solid blue. I followed the tutorial exactly as show and still no results. I issued a iwconfig, dmesg, lsusb and nothing is listed. Just to eliminate all possibilities, I used another wireless usb and it registered ASAP. Just wondering if the device may be defective or if there's something that I'm not accounting for. Please help! I'm teaching myself about pen testing and cyber security in general, even installed Snort on my ubuntu machine and have been fun with that. Any help would be greatly appreciated!
×
×
  • Create New...